Access key

Results: 1959



#Item
241Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
242Computing / Cryptography / Computer security / Computer network security / Cyberwarfare / Password / Denial-of-service attack / Firewall / SOAP / Authentication / Public-key cryptography / Internet security

Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
243

AAF Aviation Access Forum STAFF TRAINING – GUIDANCE MATERIAL A key aspect of airline and airport operators working successfully with passengers with a disability is how airline and airport staff are trained to provide

Add to Reading List

Source URL: infrastructure.gov.au

Language: English - Date: 2015-02-24 18:34:48
    244

    Strengthening Families Key Worker Entry Form (Only to be completed if you are unable to gain access Capita) Please complete at the start of your involvement to provide an important overview of the characteristics of th

    Add to Reading List

    Source URL: www.sunderlandpartnership.org.uk

    Language: English
      245

      Access Requests (April 1 to June 31, 2014) Key to Applicant Code No

      Add to Reading List

      Source URL: universitycounsel.ubc.ca

      Language: English - Date: 2014-08-28 12:43:50
        246

        DATA SHEET KEY BENEFITS ACCESSIBLE FROM ANYWHERE Access 100% of your general ledger features from anywhere

        Add to Reading List

        Source URL: www.evron.com

        Language: English - Date: 2013-04-11 15:11:44
          247

          Access Requests (October 1 to December 31, 2014) Key to Applicant Code No

          Add to Reading List

          Source URL: universitycounsel.ubc.ca

          Language: English - Date: 2015-04-24 19:39:15
            248

            Access Requests (July 1 to September 30, 2014) Key to Applicant Code No

            Add to Reading List

            Source URL: universitycounsel.ubc.ca

            Language: English - Date: 2014-10-21 19:53:16
              249Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

              BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

              Add to Reading List

              Source URL: www-users.cs.umn.edu

              Language: English - Date: 2010-12-16 18:40:43
              250Cryptography / Public-key cryptography / Attribute-based encryption / RSA / Ciphertext indistinguishability / Encryption / Key / Authenticated encryption / PERMIS / Ciphertext

              Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

              Add to Reading List

              Source URL: www.e7n.ch

              Language: English
              UPDATE